| Today’s Theme: Anticipating ThreatsHow Should We Prepare For Unknown Threats? Creating a Proactive Organization for Swift Response
When organizations Identify and assess existing, new, and emerging risks allows them prepare for impending or new risks, and enables them to potentially minimize or even prevent losses. On the information security battlefield, CISOs and their organizations face growing needs to better anticipate threats. The downside if they don’t? Dwell time grows — and with it — exponential damage to revenue, operations, and reputation. Join us as information security and business experts discuss how to define risk tolerance, share anticipatory risk strategies for business, and how CISOs and security leaders can enable them for success in their organizations.
|
|
1:00 - 1:46 PM
| Learn How CISOs can be Effective Communicators with the Corporate BoardMichael Castro, Risk Executive Advisor & Founder of RiskAware Inc.
Are CISOs failing in their communication to the Board? It’s the CISO’s job to identify the risks that are most likely to impact the business. Join us to hear how keynote speaker, Michael Castro, former CISO, Risk Executive Advisor and Founder of RiskAware Inc, and current member of NACD (National Association of Corporate Directors), is changing mindsets in a rapidly evolving threat landscape and shares his strategies & tips for effective communication with corporate leadership. You’ll also learn how Canadian SMEs or larger organizations should be investing in information security, and what steps should they be taking to bolster their resiliency in relation to the Russia-Ukraine war.
Moderated by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, Foundry (formerly IDG Communications)
|
|
1:46 - 2:18 PM
|
The Shifting Sands of Security: It’s Time to Embrace the Predictive Model to Stay Ahead of Sophisticated AttacksJohn McClurg, Senior Vice President & CISO, BlackBerry
Join us for an enlightening conversation with one of America’s most influential security professionals, John McClurg, VP and CISO at BlackBerry, as he explores why it’s crucial to switch from a reactive to predictive approach in security given the proliferation of new attack vectors. Plus he provides advice for Canadian security tech buyers on how to benchmark themselves, use managed security service providers to fill resource gaps, as well as how to get executive buy-in for preventative security investments.
Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, Foundry (formerly IDG Communications)
| Is Your Organization Prepared to Fix Its Reputation?: An Interactive WorkshopCaroline Beckmann, Senior Director, Trident DMG
Breaches and intellectual property theft are becoming more commonplace, and for each incident, an organization experiences not only financial harm, but reputational damage. Join us for this workshop to learn how you can prepare your organization to move quickly when reputational damage strikes.
|
|
|
2:18 - 2:41 PM
| Choosing the Right Customer Identity and Access Management (CIAM) that’s Safe, Cost-Effective, and Successful for the Modern OrganizationDon Cuthbertson, CTO of Converge Technology Solutions, CEO of Portage CyberTech Inc.
As CIAM has evolved over the last 5 years, choosing the right digital platform is critical to minimizing business risk, blocking cyber threats, and delivering services in a safe and timely manner. Join Portage Cybertech CEO, Don Cuthbertson and Digital ID and Authentication Council of Canada President, Joni Brennan, to learn how to create successful trusted outcomes and minimize risk when developing an effective Customer Identity and Access Management system.
Interviewed by: Joni Brennan, President, Digital ID & Authentication Council of Canada
|
|
2:41 - 3:14 PM
| Dealing with Disaster: Preparing for Key ThreatsJuliette Kayyem, CNN National Security Analyst & Faculty Director, Homeland Security Project and Security and Global Health Project, Harvard’s Kennedy School of Government
Security is constantly evolving to become more sophisticated, and yet it can’t keep up with the threats from bad actors including nation states. The first step for organizations is realizing that you will be the target of attacks – a reality that some CEOs and boards find hard to accept. With that realization, you can begin to prepare your defense to minimize the consequences. Join us for a conversation about assessing the threat landscape, defining risk appetite and supporting that with appropriate resources, crisis management, how physical and cyber security are once again converging, and the kind of leadership necessary to meet the challenge.
Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, Foundry (formerly IDG Communications)
|
|
3:14 - 3:23 PM
| Combating the 21st Century Disaster with Dell’s PowerProtect Cyber RecoveryJason Proctor, from Dell Technologies’ Global Technology Office presents on how its cyber vault is recognized by many parties such as Sheltered Harbor to ensure a safe copy of recovery during disasters. Dell’s unique engineering adopts a 3 I’s approach to ensuring companies can recover during cyber incidents.
|
|
3:25 - 4:02 PM
| Putting Cybersecurity on the National AgendaMatt MacNeil, Director, Standards & Technology, CIO Strategy Council Canada
Kevin Magee, Chief Security Officer, Microsoft Canada
Neil Desai, VP Corporate Affairs, Magnet Forensics
With the rapid advancement of technology and unprecedented adoption of digital initiatives, the security/privacy risks and vulnerabilities faced by all Canadians (individuals and citizens alike) are escalating. These risks are intensifying in light of current geopolitical situations, expanding the vulnerabilities of our cities, municipalities, critical infrastructure units, and SMBs. There is an urgent need to address these risks at the national level and we need to ensure that our governments, public and private institutions create a balanced public policy approach – one that will protect Canadians without inhibiting innovation. Listen as our expert panel discusses the role of public policy in advancing Canada’s Cybersecurity mandate.
Moderated by: Sumit Bhatia, Director of Innovation and Policy, Rogers Cybersecure Catalyst, Toronto Metropolitan University
|
|
4:02 - 4:12 PM
| Break Time |
|
4:12 - 4:35 PM
| Design and Deploy Zero Trust EnterpriseGarry Coldwells, Solutions Architect, Palo Alto Networks
Cyberthreats are disrupting our lives now more than ever, and organizations are turning to Zero Trust for complete network security. But how do you make Zero Trust actionable for your organization? Digital transformation is accelerating, with key shifts such as the expanding hybrid workforce and continued migration of applications and data to the cloud. As we make this transformation, information security teams have the opportunity to adopt a modern Zero Trust approach that fits these significant shifts. This means taking Zero Trust principles and making them actionable across users, applications and infrastructure, effectively rebuilding security to keep pace with these tectonic shifts. Join us as we explore how Palo Alto Networks can help you navigate this journey through our unique blend of the highest level of capabilities, an integrated platform and extensive in-house expertise around Zero Trust.
|
|
4:35 - 5:01 PM
| Anticipating Rising ThreatsDeneen DeFiore, Vice President & CISO, United Airlines
As one of the largest airlines in the world, United Airlines faces — and manages — rising threats every day. Join us to learn how they mitigate risks in an environment of unknown and rising threats.
Interviewed by: Derek Hulitzky, Former VP Content Development & Strategy, Foundry (formerly IDG Communications)
|
|
5:01 - 5:07 PM
| Self-Learning AI Defends Attacks Faster Than Your Team, Presented by DarktraceJake Dorio, Cybersecurity Account Executive & Team Lead, Darktrace
|
|
5:07 - 5:35 PM
|
IDC’s Future of Trust 2022 Predictions for CanadaYogesh Shivhare, Research Mgr., Security & Infrastructure, IDC Canada
Trusted ecosystems in Canada are under attack as cyber threats continue to rise. IDC predicts by 2025, 30% of Canadian IT buyers will adopt network security as a service to ensure consistent protection. Join us as IDC reveals why this, and other predictions, are important for Canadian business and IT leaders in 2022.
| IDC’s Global Predictions for the Future of TrustAmita Potnis, Former Research Director, Future of Trust, IDC
To align traditional security and risk solutions with customer success, brand, and reputation, IDC predicts that by 2025, 35 percent of organizations will replace net promoter score-like metrics with trust indices in RFPs. Join us as IDC reveals why this, and other predictions, are important for CISOs in 2022.
|
|
|
5:35 - 6:06 PM
| Strategies for Finding, Growing and Retaining Security TalentTim Byrd, CISO, TIAA
Khalilah Scott, Founder, TechSecChix
Jeff Weber, Executive Director, Robert Half
There are millions of unfilled cybersecurity jobs, according to some estimates, increasing demand to unprecedented levels. At the same time, the frequency and severity of cyberattacks are also increasing, forcing organizations to stretch their security talent. Join us as our panel of experts explore short- and long-term solutions for recruiting and retaining security talent, while adding diversity to their teams.
Interviewed by: Beth Kormanik, Manager, Content Development, Foundry (formerly IDG Communications)
|
|